Youness Idrissi Khamlichi

Learn More
Confidentiality is an ethical necessity in health care. As for teleconsulting and telediagnosis, the use of multimedia technologies for telemedicine purposes is now gaining the ground all over the world. The progress increased however the risk of violation of the authenticity and integrity of the patient's records as the circulation of data via Internet is(More)
In this paper, we propose an efficient digital watermarking scheme to strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient's information. Doctors diagnose medical images by seeing Region of Interest (ROI). A ROI of a medical image is an area(More)
In the modern health service, data are stored in a Data Center and it can be accessed only by authorized users. However, this Data are prone to be exposed to a number of attacks, especially by the Cloud provider's Personnel with privileged access. To avoid illegal access to comprehensive content of data center including patient's information, we propose in(More)
Secure and efficient management of multimedia objects in medical information system have become a necessity in today's global environment. To strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient's information, we propose in this article a mechanism(More)
The Telecare Medicine Information System (TMIS) has established a connection between patients at home and doctors at a clinical center by using telecommunication systems and physiological monitoring devices. Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctors accessing to Electronic Medical(More)
XML is widely used for data exchange between systems and applications. XML data are described in hierarchical form using XML schema languages such as XML DTD (Document Type Definition), W3C XML Schema or XDR (XML Data Reduced). To make these data accessible to relational database systems, which represent a dominant and efficient tool for storing and(More)
Over the years, network intrusion detection systems have evolved to handle varying types of threats. These days, network managers expect network intrusion detection systems (IDS) to detect attacks and include anomaly-awareness, in addition to handling older threats that haven't disappeared. Researchers have proposed different methods and algorithms to(More)
XML is a standard for data exchanging between sites and heterogeneous applications. To exploit these data by database systems based on relational model, algorithms and methods of conversion have been developed. To do same with object-relational systems representing an extension of relational systems we propose in this paper a methodology to convert a XML(More)
Nowadays the amount of data that is being generated every day is increasing in a high level for various sectors. In fact, this volume and diversity of data push us to think wisely for a better solution to store, process and analyze it in the right way. Taking into consideration the healthcare industry, there is a great benefit for using the concept of big(More)
  • 1